Technical Security Measures Sample Clauses

Technical Security Measures. The HTL ISMS defines rigorous policies in respect to mobile security and requires mobile devices (laptops, mobile computers, PDAs, mobile phones, USB sticks and other similar memory devices) to have: (i) password protection, (ii) where appropriate/possible and to be encrypted, (iii) the most recent operating system and application security-related patches, fixes and updates installed.
AutoNDA by SimpleDocs
Technical Security Measures. 1.1 Delightex carries out regularly - and at least annually - an assessment of whether procedures, policies and records of processing activities must be updated.
Technical Security Measures. 2.2.1 ACCESS ADMINISTRATION. Access to the Connected Operations Product by ServiceNow employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to the Connected Operations Product. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationships. Production infrastructure includes appropriate user account and password controls (e.g., complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
Technical Security Measures. Supplier shall throughout its Processing of Everest Group Personal Data:
Technical Security Measures. 2.2.1. ACCESS ADMINISTRATION. Access to the Subscription Service by Kensu employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to production and sub-production instances. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationships. Production infrastructure includes appropriate user account and password controls (e.g., the required use of VPN connections, complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
Technical Security Measures. 11.3.1 That it has implemented safeguards to protect their computer network against accidental, unlawful or unauthorized usage, any interference which will affect data integrity or hinder the functioning or availability of the system, and unauthorized access through an electronic network;
Technical Security Measures. 2.2.1. ACCESS ADMINISTRATION. Access to the Subscription Service by ServiceNow employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to production and sub-production instances. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationships. Production infrastructure includes appropriate user account and password controls (e.g., the required use of VPN connections, complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
AutoNDA by SimpleDocs
Technical Security Measures. Provider shall perform vulnerability scanning and assessments on new and key applications and infrastructure. Provider shall deploy all applicable and necessary system security patches and use up-to-date, industry standard, commercial virus/malware scanning software that identifies malicious code on all of its systems that collect, use, disclose, store, retain or otherwise Process Uber Personal Data.
Technical Security Measures. That it has implemented safeguards to protect their computer network against accidental, unlawful or unauthorized usage, any interference which will affect data integrity or hinder the functioning or availability of the system, and unauthorized access through an electronic network; That it has the ability to ensure and maintain the confidentiality, integrity, availability, and resilience of their processing systems and services; That it performs regular monitoring for security breaches, and a process both for identifying and accessing reasonably foreseeable vulnerabilities in their computer networks, and for taking preventive, corrective, and mitigating action against security incidents that can lead to a personal data breach; That it has the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; That it has a process for regularly testing, assessing, and evaluating the effectiveness of security measures; That it encrypts personal data during storage and while in transit, authentication process, and it has implemented other technical security measures that control and limit access. Compliance with FIRST PARTY’s IT Policies and Procedures SECOND PARTY undertakes to comply with the following IT policies and procedures of FIRST PARTY, which are hereby incorporated by reference into this Data Outsourcing Agreement, as applicable. Example: Physical Security Policy Back-up Policy Access Management Change Management Intrusion Detection and Prevention Policy including any amendments, modifications, or supplement to these policies and procedures, duly notified in writing to SECOND PARTY from time to time. FIRST PARTY may also notify SECOND PARTY in writing of additional IT policies and procedures, in which case, it shall allow SECOND PARTY a reasonable period to comply with the same. INDEMNIFICATION SECOND PARTY agrees to irrevocably, unconditionally, and fully indemnify and hold FIRST PARTY, its officers, employees, and agents, free and harmless from and against any and all claims, suits, actions or demands or losses, damages, costs and expenses including, without limiting the generality of the foregoing, attorney’s fees and costs of suit that FIRST PARTY may face, suffer or incur by reason or in respect of: SECOND PARTY’s or its sub-contractor’s breach of any of the warranties and obligations set forth in this Agreement, regardless of the cause of such breach; or Any act, omission or ne...
Technical Security Measures. 2.2.1. ACCESS ADMINISTRATION. Pleo will ensure that access by personnel to Customer Data will be conducted in a manner that: (i) is protected by authentication and authorization mechanisms; (ii) requires personnel to be assigned a unique user account; (iii) restricts the sharing of individual user accounts; (iv) requires strong authentication with complex passwords; (v) ensures accounts are lock-out enabled; (vi) enforces security controls that adhere to the zero trust principle; (vii) requires access privileges be based on job requirements limited to that necessary for the applicable personnel to undertake their duties; (viii) ensures access is revoked upon termination of employment or consulting relationships; and (ix) requires access entitlements be reviewed by management quarterly.
Time is Money Join Law Insider Premium to draft better contracts faster.